343 Commits

Author SHA1 Message Date
antoine
7575a14043 Add files to remove when MK_PF=no. 2010-02-28 14:37:39 +00:00
antoine
2b913d765e Add files to remove when MK_NTP=no. 2010-02-28 14:32:29 +00:00
antoine
ff068132e2 Update files to remove when MK_RCMDS=no. 2010-02-28 14:29:22 +00:00
antoine
6d09dcaa15 Add files to remove when MK_RCS=no. 2010-02-28 14:26:28 +00:00
antoine
b0faa7e726 Add files to remove when MK_ROUTED=no. 2010-02-28 14:24:38 +00:00
antoine
f9cfb0be13 Add files to remove when MK_TELNET=no. 2010-02-28 14:23:38 +00:00
antoine
a4454ac9a6 Add files to remove when MK_NDIS=no. 2010-02-28 14:21:15 +00:00
antoine
19570a5d80 Update files to remove when MK_NCP=no. 2010-02-28 14:13:33 +00:00
antoine
37c52e52bc Update files to remove when MK_LPR=no. 2010-02-28 14:12:05 +00:00
antoine
d2c02366c9 Add files to remove when MK_WIRELESS=no. 2010-02-28 14:08:12 +00:00
antoine
0252b0ea1b Do not remove fmt.1 when MK_MAIL=no.
X-MFC-With:	r203584
2010-02-26 23:26:15 +00:00
delphij
f4340253d5 Symbolic link to mailwrapper should only be removed if both MK_MAILWRAPPER
and MK_SENDMAIL is "no".

Reported by:	Rob Farmer <rfarmer at predatorlabs.net>
2010-02-10 00:01:35 +00:00
delphij
13dc1aaf66 As it turns out, fmt(1) is being used by the base system as well as the
ports tree extensively and it is probably a good idea to keep it
regardless of NO_MAIL setting.

Reported by:	Alexander Best
Reviewed by:	antoine
X-MFC-With:	r203584
2010-02-09 18:22:26 +00:00
delphij
626ec8ce6e Add files for NO_MAIL, NO_SENDMAIL and NO_MAILWRAPPER.
MFC after:	2 weeks
2010-02-07 00:38:31 +00:00
antoine
4b236d0b57 Update files to remove when MK_KERBEROS=no. 2010-02-06 20:21:03 +00:00
antoine
35ab0aaa2c Add files to remove when MK_JAIL=no. 2010-02-06 20:11:23 +00:00
antoine
0302abf97a Update files to remove when MK_IPX=no. 2010-02-06 20:09:55 +00:00
antoine
5d9ac4f480 Add files to remove when MK_IPFW=no. 2010-02-06 20:08:46 +00:00
antoine
8d4298591a Move rescue/ping6 from files to remove when MK_INET6=no to file to remove
when MK_INET6_SUPPORT=no.  (MK_INET6=no implies MK_INET6_SUPPORT=no)
2010-02-06 20:06:06 +00:00
antoine
36a370a844 Add file to remove when MK_IDEA=no. 2010-02-06 20:02:56 +00:00
antoine
7a4687f407 Add files to remove when MK_GSSAPI=no. 2010-02-06 20:00:35 +00:00
antoine
b08756e9ed Add files to remove when MK_GPIB=no. 2010-01-30 19:36:55 +00:00
antoine
920ff87426 Add files to remove when MK_GDB=no. 2010-01-30 19:33:45 +00:00
antoine
8a4538421f Add files to remove when MK_GAMES=no. 2010-01-30 19:32:01 +00:00
antoine
ac45edf95b Add files to remove when MK_FREEBSD_UPDATE=no. 2010-01-30 19:29:02 +00:00
antoine
0349a36e6e Add files to remove when MK_FLOPPY=no. 2010-01-30 19:26:28 +00:00
antoine
fd0073d828 Add files to remove when MK_DICT=no. 2010-01-24 14:13:56 +00:00
antoine
d74856acb4 Add files to remove when MK_CVS=no. 2010-01-24 14:09:45 +00:00
antoine
b7f603c9e0 Add files to remove when MK_CTM=no. 2010-01-24 14:06:19 +00:00
antoine
b513317814 Add files to remove when MK_CPP=no. 2010-01-24 14:04:38 +00:00
antoine
cedc84aabb Update files to remove when MK_ZFS=no. 2010-01-16 20:42:50 +00:00
antoine
e2ca4ffb16 Update files to remove when MK_CDDL=no. 2010-01-16 20:40:12 +00:00
antoine
a15e8fdc8f Add files to remove when MK_CALENDAR=no. 2010-01-16 20:36:27 +00:00
antoine
a880ee87bc Update files to remove when MK_BLUETOOTH=no. 2010-01-09 19:52:42 +00:00
antoine
c06b0ac5c7 Add files to remove when MK_AUTHPF=no. 2010-01-09 19:13:56 +00:00
antoine
afce8c25b5 Add files to remove when MK_ATM=no. 2010-01-09 19:12:33 +00:00
antoine
a8225bcb60 Add files to remove when MK_AT=no. 2010-01-09 19:09:16 +00:00
antoine
bca24819c8 Add files to remove when MK_APM=no. 2010-01-09 19:07:04 +00:00
antoine
8283a25bdd Add files to remove when MK_AMD=no. 2010-01-09 19:04:38 +00:00
antoine
5a2e2b97d2 Add files to remove when MK_ACCT=no. 2010-01-09 19:02:33 +00:00
jamie
c6535b4fd4 Add libjail, a (somewhat) simpler interface to the jail_set and jail_get
system calls and the security.jail.param sysctls.

Approved by:	bz (mentor)
2009-06-24 18:19:55 +00:00
dougb
ec14ac76ed Add support for the build options that are currently in the port:
WITH_BIND_IDN
	WITH_BIND_LARGE_FILE
	WITH_BIND_SIGCHASE
	WITH_BIND_XML
2009-06-01 21:58:59 +00:00
ed
36d960175a Remove if_ppp(4) and if_sl(4).
Not only did these two drivers depend on IFF_NEEDSGIANT, they were
broken 7 months ago during the MPSAFE TTY import. if_ppp(4) has been
replaced by ppp(8). There is no replacement for if_sl(4).

If we see regressions in for example the ports tree, we should just use
__FreeBSD_version 800045 to check whether if_ppp(4) and if_sl(4) are
present. Version 800045 is used to denote the import of MPSAFE TTY.

Discussed with: rwatson, but also rwatson's IFF_NEEDSGIANT emails on the
                lists.
2009-04-05 22:08:18 +00:00
mtm
1de5dbac2f Doh! r188813 modified an auto-generated file. Fix it for real:
o grammar fix
  o remove mention of libkse

Submitted by:	Niclas Zeising <niclas.zeising@gmail.com>
2009-02-20 11:09:55 +00:00
sam
535b586e4a add missing options 2008-09-23 16:15:42 +00:00
sam
8d8eb7dc9c add missing options 2008-09-23 16:11:15 +00:00
sam
9c3d2ffcdf add new build knobs and jigger some existing controls to improve
control over the result of buildworld and installworld; this especially
helps packaging systems such as nanobsd

Reviewed by:	various (posted to arch)
MFC after:	1 month
2008-09-21 22:02:26 +00:00
antoine
a7c4611926 Add files to remove when WITHOUT_HESIOD is set.
This fixes "make check-old" when WITH_HESIOD is set.

PR:		122406
MFC after:	1 month
2008-09-13 17:29:49 +00:00
antoine
41ca50f84b Add files to remove when MK_GNU_CPIO = no 2008-07-28 18:00:45 +00:00
ru
8735fdbd4c Enable GCC stack protection (aka Propolice) for userland:
- It is opt-out for now so as to give it maximum testing, but it may be
  turned opt-in for stable branches depending on the consensus.  You
  can turn it off with WITHOUT_SSP.
- WITHOUT_SSP was previously used to disable the build of GNU libssp.
  It is harmless to steal the knob as SSP symbols have been provided
  by libc for a long time, GNU libssp should not have been much used.
- SSP is disabled in a few corners such as system bootstrap programs
  (sys/boot), process bootstrap code (rtld, csu) and SSP symbols themselves.
- It should be safe to use -fstack-protector-all to build world, however
  libc will be automatically downgraded to -fstack-protector because it
  breaks rtld otherwise.
- This option is unavailable on ia64.

Enable GCC stack protection (aka Propolice) for kernel:
- It is opt-out for now so as to give it maximum testing.
- Do not compile your kernel with -fstack-protector-all, it won't work.

Submitted by:	Jeremie Le Hen <jeremie@le-hen.org>
2008-06-25 21:33:28 +00:00